Skip to main content

Posts

Showing posts from 2013

Hide your shadow and bypass the security: Part 2

Hey Friends, Today I am going to show you a  method by which you can access websites blocked by your network administrator. Before you go through this tutorial also try to check the first tutorial of the security bypass : Here is the link :  http://oxhat.blogspot.in/2012/10/hide-your-shadow-and-bypass-security.html The advantage of this technique is that page loads faster compared to tor or other proxy software.It also bypass the gstatic filtering/blocking. Gstatic.com is a domain used by Google which is an other company that is part of a network of sites, cookies, and other technologies used to track you, what you do and what you click on, as you go from site to site, surfing the Web  Step 1. Go to translate.google.com.  Step 2. Select translation from English to Chinese / any other language , but not English !!  Now click the translate button   Now Click the show original button on the right side  and you will be able to get the desired  version in 

Hacking C codes.The Dark Art of Reverse Engineering Part 1

Hacking C codes. The Dark Art of Reverse Engineering Part 1: Decompile You may or may not have used some sort of cracks ,keygens ,patches etc at some  point in your life. Have you ever thought how they are developed ? . Today in this tutorial I am going to demonstrate you the "dark art of reverse engineering" Now before I begin I must say that Reverse Engineering is really a tough , tedious job. It requires huge amount of time.To learn reverse engineering one must show enough dedication and patience.The tutorial that I am going to demonstrate took about a hell lot of time to disassemble ,decompile and interpret the outputs. okay so lets begin.. Caution: This tutorial should be used for educational purpose only. I won't be responsible if you misuse this techniques and get yourself in trouble.Reverse Engineering  any software without the permission of owner's permission is treated as an illegal activity. The software which I will be hacking as a

Tracking Down the Culprit PandoraService.exe

Tracking Down the Culprit PandoraService.exe Sometimes when you monitor the net usage you might have come across some weird net usage.You might have said "How the hell did such bandwidth consumption occur ?" Yes sometimes it happens. Today I am going to show you how you can encounter such problems and bring out solutions for such problems. Here is a simple scenario that I am going to explain and demonstrate.This cannot be categorized as a tutorial but rather a method how you can find out more about services that consumes extensive bandwidth..I guess if  you read this you can also take down such culprits too in  a similar way.So here we go  I was playing around with Wireshark for a while,analyzing the packets in network.All of a sudden I noticed something weird in the traffic of the network.I found that lots of TCP-SYN packets are being sent from my local ip to a remote ip having an address 111.111.111.111. I checked the inboud and outbound connections  I

Google Dorks (Google Hacking) Part I

Google Dork are the quickest way to retrieve the results from google   Google hacking  is a  technique of using  Google Search  to find security holes in the  configuration  and vulnerability   present in  websites,web server,security cameras,etc "  CAUTION "This tutorial should be used for educational purpose only. I won't be responsible if you misuse this techniques and get yourself in trouble." In this tutorial I am going to cover the basics of google dorks The Google Dorks Tutorial is divided in multiple parts . In this first part we will get acquainted with basics of google dorking and the "harmless" use of google dorks. So enjoy the tutorial . Here are the few examples of google dorks  inurl:java                           displays java' in the url dns site:example.com    restricts the"dns" results to websites in a given domain. php filetype:pdf        displays links of downloadable PDF fi

Session Hijacking and Fixation

Session hijacking basically refers to hijacking a server's particular session where as  Session Fixation means authenticating a user without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions. The combined attack of  Session Hijacking and Session Fixation gives a malicious user full access as an  authenticated  use. Web Applications requires Cookies to store temporary data. Sometimes these cookies stores session ID of a logged in user.This enables the user to be uniquely identified by the server till he logs out and the session is being destroyed. The attack can be represented as follow For this demonstration I am using  Firefox Browser ( Attacker ) Comodo IceDragon Browser ( Victim ) Tamper data ( Firefox Addon ) This tutorial requires Cookie Stealing Methods. If you dont know about it check my previous post.                                                                              CAUTIO

Web Application Hacking : Cookie Stealing

Cookie Stealing                                  Cookies are small datas (usually 4KB in size) that are stored in clients browser . They are usually generated at the server by the server side scripting language . After that they are sent back and stored at the client browser.They help in tracking necessary information like the time of access,username,session information,etc of the client who is logged into a particular website                                    In this tutorial I am going to show how cookies are being stolen and logged into a separate file.                                                                       CAUTION "This tutorial should be used for educational purpose only. I won't be responsible if you misuse this techniques and get yourself in trouble.Performing such attacks without the permission of the owner can lead to serious trouble."                                 Here is the HTML code of the login form of a sample application.